[1] |
TIWARI B , KUMAR A . Role-based access control through on-demand classification of electronic health record[J]. International Journal of Electronic Healthcare, 2015,8(1): 9.
|
[2] |
GATES C E , . Access control requirements for Web 2.0 security and privacy[C]// Proceedings of Workshop on Web 2.0 Security and Privacy. 2007: 249-256.
|
[3] |
姚瑞欣, 李晖, 曹进 . 社交网络中的隐私保护研究综述[J]. 网络与信息安全学报, 2016,2(4): 33-43.
|
|
YAO R X , LI H , CAO J . Overview of privacy preserving in social network[J]. Chinese Journal of Network and Information Security, 2016,2(4): 33-43.
|
[4] |
FONG P W L , . Relationship-based access control:protection model and policy language[C]// ACM Conference on Data & Application Security & Privacy. 2011: 191-202.
|
[5] |
RIZVI S Z R , FONG P W L , CRAMPTON J ,et al. Relationship-based access control for an open-source medical records system[C]// The 20th ACM Symposium. 2015: 113-124.
|
[6] |
GUO L , ZHANG C , FANG Y . A Trust-based privacy-preserving friend recommendation scheme for online social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2015,12(4): 413-427.
|
[7] |
CHENG Y , PARK J , SANDHU R . A user-to-user relationship-based access control model for online social networks[J]. IEEE Transactions on Dependable & Secure Computing, 2017,13(4): 1-1.
|
[8] |
CHENG Y , PARK J , SANDHU R . Attribute-aware relationship-based access control for online social networks[M]. Data and Applications Security and Privacy XXVIII. Springer Berlin Heidelberg, 2014: 292-306.
|
[9] |
李凤华, 孙哲, 牛犇 ,等. 跨社交网络的隐私图片分享框架[J]. 通信学报, 2019,40(7): 1-13.
|
|
LI F H , SUN Z , NIU B ,et al. Privacy-preserving photo sharing framework cross different social network[J]. Journal on Communications, 2019,40(7): 1-13.
|
[10] |
ANSHELEVICH E , BHARDWAJ O , USHER M . Friend of my friend:network formation with two-hop benefit[J]. Theory of Computing Systems, 2015,57(3): 711-752.
|
[11] |
陈天柱, 郭云川, 牛犇 ,等. 面向社交网络的访问控制模型和策略研究进展[J]. 网络与信息安全学报, 2016,2(8): 1-9.
|
|
CHEN T Z , GUO Y C , NIU B ,et al. Research progress of access control model and policy in online social networks[J]. Chinese Journal of Network and Information Security, 2016,2(8): 1-9.
|
[12] |
唐文, 陈钟, 段云所 . 公钥密码技术[J]. 网络安全技术与应用, 2001: 61-64.
|
|
TANG W , CHEN Z , DUAN Y S . Public key cryptography[J]. Network Security Technology and Application, 2001: 61-64.
|
[13] |
李凤华, 孙哲, 吕梦凡 ,等. 社交照片隐私保护机制研究进展[J]. 信息安全学报, 2018(2): 41-61.
|
|
LI F H , SUN Z , LYU M F ,et al. Research progress of photo privacy-preserving mechanisms in online social network[J]. Journal of Cyber Security, 2018(2): 41-61.
|
[14] |
KARJOTH G U , SCHUNTER M , WAIDNER M . Platform for enterprise privacy practices:Privacy-enabled management of customer data[C]// International Conference on Privacy Enhancing Technologies. 2002: 69-84.
|
[15] |
BAKER E . EXIF Custom:Automatic image metadata extraction for Scratchpads and Drupal[J]. Biodiversity Data Journal, 2013,1(1): e973.
|
[16] |
杨晓锋 . 数码图像文件格式标准 Exif 解读[J]. 照相机, 2006(4): 69-71.
|
|
YANG X F . Interpretation of digital image file format standard Exif[J]. Camera, 2006(4): 69-71.
|